Usable Security: What Is It? How Do We Get It?

Bibliographic Details
Main Authors: Sasse, M, Flechais, I
Other Authors: Cranor, L
Format: Book
Published: 2005
_version_ 1826279805397499904
author Sasse, M
Flechais, I
author2 Cranor, L
author_facet Cranor, L
Sasse, M
Flechais, I
author_sort Sasse, M
collection OXFORD
description
first_indexed 2024-03-07T00:04:17Z
format Book
id oxford-uuid:77002ad4-ac40-479d-8818-05f4884d8d99
institution University of Oxford
last_indexed 2024-03-07T00:04:17Z
publishDate 2005
record_format dspace
spelling oxford-uuid:77002ad4-ac40-479d-8818-05f4884d8d992022-03-26T20:20:20ZUsable Security: What Is It? How Do We Get It?Bookhttp://purl.org/coar/resource_type/c_2f33uuid:77002ad4-ac40-479d-8818-05f4884d8d99Department of Computer Science2005Sasse, MFlechais, ICranor, LGarfinkel, S
spellingShingle Sasse, M
Flechais, I
Usable Security: What Is It? How Do We Get It?
title Usable Security: What Is It? How Do We Get It?
title_full Usable Security: What Is It? How Do We Get It?
title_fullStr Usable Security: What Is It? How Do We Get It?
title_full_unstemmed Usable Security: What Is It? How Do We Get It?
title_short Usable Security: What Is It? How Do We Get It?
title_sort usable security what is it how do we get it
work_keys_str_mv AT sassem usablesecuritywhatisithowdowegetit
AT flechaisi usablesecuritywhatisithowdowegetit